会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Double phase encoding quantum key distribution
    • 双相编码量子密钥分配
    • US20070076887A1
    • 2007-04-05
    • US11241164
    • 2005-09-30
    • Randy KuangGuo WangJohn Stankus
    • Randy KuangGuo WangJohn Stankus
    • H04L9/00
    • H04L9/0858
    • A laser pulse representing a bit of a quantum key is split into two pulses. In addition to known round trip phase encoding schema, a secret phase key is modulated into one of the two pulses: P1 and P2. The secret phase key is used to identify whether the returning pulses originated from the sender, i.e., whether the key distribution has been attacked by an eavesdropper. A secret key phase modulator randomly modulates pulse P1. An attenuator then reduces the average photon number of the modulated pulse P1 to a selected level greater than one to increase the likelihood of efficient, successful transmission while reducing the possibility of eavesdropping, e.g., μ=10. Both pulses P1 and P2 are sent to the intended recipient and reflected to the sender. Pulse P2 is modulated upon return to the sender using the same secret phase key previously modulated into pulse P1. Therefore, when both pulses meet together at a coupler/beamsplitter of the sender, both pulses should contain the same secret key in their phase and therefore exhibit no resulting phase difference if the photon pulse is the same pulse originated by the sender. If the returning pulse is not the pulse originated by the sender then phase differences indicative of a so-called intercept-resend attack applied by an eavesdropper EVE are indicated by a large quantum bit error rate (“QBER”) will be detectable. If EVE applies photon-split attack, the secret phase key modulated by the sender prevents Eve from knowing the encoded key information in the photon(s). Therefore, double phase encoding QKD enables use of multi-photon pulses without unacceptable loss of security, thereby enhancing QKD bit rate.
    • 表示量子键位的激光脉冲被分成两个脉冲。 除了已知的往返相位编码模式之外,秘密相位键被调制成两个脉冲之一:P 1和P 2。 秘密相位键用于识别来自发送者的返回脉冲是否是密钥分发是否已被窃听者攻击。 秘密密钥相位调制器随机调制脉冲P 1。 然后,衰减器将调制脉冲P 1的平均光子数减小到大于1的选定电平,以增加有效成功传输的可能性,同时降低窃听的可能性,例如,μ= 10。 两个脉冲P 1和P 2被发送到预期的接收者并被反射到发送者。 在使用预先调制到脉冲P 1中的相同秘密相位键返回发送器时,脉冲P 2被调制。 因此,当两个脉冲在发送器的耦合器/分束器处相遇在一起时,两个脉冲在它们的相位中应该包含相同的秘密密钥,因此如果光子脉冲是由发送器产生的相同的脉冲,则不会产生相位差。 如果返回的脉冲不是由发送器产生的脉冲,则指示由窃听者EVE施加的所谓的截距重发攻击的相位差由大量子比特误码率(“QBER”)指示。 如果EVE应用光子分裂攻击,则由发送者调制的秘密相位键防止Eve知道光子中的编码密钥信息。 因此,双相编码QKD使得能够使用多光子脉冲而不会无法接受的安全损失,从而提高QKD比特率。
    • 4. 发明申请
    • Double phase encoding quantum key distribution
    • 双相编码量子密钥分配
    • US20070076888A1
    • 2007-04-05
    • US11481826
    • 2006-07-07
    • Randy KuangGuo WangJohn Stankus
    • Randy KuangGuo WangJohn Stankus
    • H04L9/00
    • H04L9/0858
    • A method of distributing a quantum key from a sender to a recipient. The recipient generates a pulse having multiple photons; splits the pulse into first and second sub-pulses; phase modulates the first sub-pulse with a secret key; and transmits both the phase-modulated first sub-pulse and the second sub-pulse to the sender. The sender receives the phase-modulated first sub-pulse and the second sub-pulse from the recipient; encodes a quantum key bit into one of the sub-pulses received from the recipient; and transmits both the phase-modulated first sub-pulse and the second sub-pulse back to the recipient. Then, the recipient receives the phase-modulated first sub-pulse and the second sub-pulse from the sender; phase modulates the second sub-pulse with the secret key; combines the phase-modulated first sub-pulse and the phase-modulated second sub-pulse to produce a composite pulse; and processes the composite pulse in an attempt to detect the quantum key bit.
    • 将量子密钥从发送方分发到接收方的方法。 接收者产生具有多个光子的脉冲; 将脉冲分为第一和第二子脉冲; 用秘密密钥对第一子脉冲进行相位调制; 并将相位调制的第一子脉冲和第二子脉冲发送到发送器。 发送方从接收方接收相位调制的第一子脉冲和第二子脉冲; 将量子密钥位编码为从接收者接收的子脉冲之一; 并将相位调制的第一子脉冲和第二子脉冲发送回接收器。 然后,接收者从发送者接收相位调制的第一子脉冲和第二子脉冲; 用秘密密钥对第二子脉冲进行相位调制; 组合相位调制的第一子脉冲和相位调制的第二子脉冲以产生复合脉冲; 并处理复合脉冲以试图检测量子密钥位。
    • 6. 发明申请
    • Methods and systems for a wireless routing architecture and protocol
    • 无线路由架构和协议的方法和系统
    • US20070097945A1
    • 2007-05-03
    • US11481825
    • 2006-07-07
    • Guo WangShiquan Wu
    • Guo WangShiquan Wu
    • H04J3/24
    • H04W40/04H04L45/12H04L45/26H04W40/12H04W40/246H04W40/30H04W80/00H04W88/04Y02D70/146Y02D70/22Y02D70/32Y02D70/34
    • The present invention provides a method for generating routing paths in a multi-hop network. The multi-hop network includes a base station, at least one relay station, and at least one non-relay mobile station. The routing paths are paths between the base station and the at least one non-relay mobile station via the at least one relay station. The base station broadcasts a path discovery message (PDM) including a path list with a starting point of the path list being the base station. Each of the relay stations receives the PDM and updates the PDM by adding their own respective node identifier to the path list and broadcasting the updated PDM. The PDMs eventually reach the non-relay mobile station. The non-relay mobile stations reply to the base station by sending the base station the updated path list between the base station and the non-relay mobile station. In some embodiments the base station or the at least one non-relay mobile station acting as a source node sends a dynamic service (DSx) message including an end-to-end path list to an end of path destination. The relay stations use the path list to forward the message between the source node and the end of path destination. In some implementations the multi-hop network operates in a manner that is consistent with any one of: IEEE 802.16, IEEE 802.16d, and IEEE 802.16e.
    • 本发明提供一种在多跳网络中生成路由路径的方法。 多跳网络包括基站,至少一个中继站和至少一个非中继移动站。 所述路由路径是经由所述至少一个中继站的所述基站与所述至少一个非中继移动站之间的路径。 基站广播路径发现消息(PDM),其包括具有作为基站的路径列表的起始点的路径列表。 每个中继站接收PDM,并通过将其各自的节点标识符添加到路径列表并且广播更新的PDM来更新PDM。 PDM最终到达非中继移动台。 非中继移动台通过在基站和非中继移动台之间发送基站更新的路由列表来回复基站。 在一些实施例中,用作源节点的基站或至少一个非中继移动台将包括端到端路径列表的动态服务(DSx)消息发送到路径目的地的末端。 中继站使用路径列表在源节点和路径目的地的末尾之间转发消息。 在一些实现中,多跳网络以与IEEE 802.16,IEEE 802.16d和IEEE 802.16e中的任何一个相一致的方式运行。
    • 7. 发明申请
    • Method and apparatus for computing metric information for abstracted network links
    • 用于计算抽象网络链路的度量信息的方法和装置
    • US20050111375A1
    • 2005-05-26
    • US10718681
    • 2003-11-24
    • Ravi RavindranPeter Ashwood SmithGuo WangHong Zhang
    • Ravi RavindranPeter Ashwood SmithGuo WangHong Zhang
    • H04L12/56H04L12/66
    • H04L45/123H04L45/12
    • A method and apparatus for associating metric information with an abstracted link of an abstracted network map that includes certain network elements (NEs) of a data transport network involves computing routes through the data transport network between the NEs of the abstracted network map. The routes may be computed using the shortest widest path algorithm. The routes from an NE are exchanged with the other NEs of the abstracted network map, so that an edge NE receives the resource availability information of all optimal routes between pairs of NEs in the abstracted network map. The edge NE then transforms the resource availability of a corresponding optimal route into metric information of an abstracted link. The metric information is sent to a client associated with the abstracted network map to permit the client to make routing decisions.
    • 用于将度量信息与包括数据传输网络的某些网元(NE)的抽象网络映射的抽象链路相关联的方法和装置涉及通过抽象网络映射的NE之间的数据传输网络来计算路由。 可以使用最短最宽路径算法计算路由。 来自网元的路由与抽象网络图的其他网元交换,边缘网元在抽象网络图中收到网元对之间的所有最优路由的资源可用性信息。 边缘NE然后将对应的最优路由的资源可用性转换为抽象链路的度量信息。 将度量信息发送到与抽象网络映射关联的客户端,以允许客户端做出路由决定。
    • 8. 发明申请
    • Method and apparatus for deriving allowable paths through a network with intransitivity constraints
    • 通过具有不确定性限制的网络导出允许路径的方法和装置
    • US20050088978A1
    • 2005-04-28
    • US10691517
    • 2003-10-24
    • Hong ZhangPeter SmithGuo Wang
    • Hong ZhangPeter SmithGuo Wang
    • H04L12/28H04L12/56
    • H04L45/48H04L45/02H04L45/12
    • A method of computing allowable routes through a data network that includes a subnetwork that introduces a subnet intransitivity constraint on allowable paths through the network involves using an abstracted network map to construct a directed graph that compensates for the subset intransitivity constraint by removing all unallowable paths. The abstracted network map may be used to compute least cost allowable paths through the network. The directed graph represents the same network, and is constructed by representing bi-directional links between the subnetwork elements with two directed edges, and representing the subnetwork elements as paired ingress and egress nodes. A method for constructing the directed graph representing an abstracted map of a network that exhibits subset intransitivity is also described.
    • 通过数据网络计算允许路由的方法,该数据网络包括通过网络在允许的路径上引入子网不可约束约束的子网络涉及使用抽象的网络映射来构造有向图,该有向图通过去除所有不允许的路径来补偿子集的传输约束。 抽象网络图可以用于计算通过网络的最小成本允许路径。 有向图表示相同的网络,并且通过在具有两个有向边缘的子网络元件之间表示双向链路并且将子网络元素表示为配对的入口和出口节点来构造。 还描述了一种用于构建表示呈现子集不透明性的网络的抽象地图的有向图的方法。
    • 9. 发明申请
    • Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission
    • 监测支持多量子脉冲传输的量子通道完整性的方法和装置
    • US20060256966A1
    • 2006-11-16
    • US11235134
    • 2005-09-27
    • Randy KuangGuo Wang
    • Randy KuangGuo Wang
    • H04K1/00
    • H04B10/70H04L9/0858
    • A transmitter classifies quantum pulses into supervisory pulses and message pulses, and assigns each message pulse to a message bit. Each message pulse is then encoded using a coding base randomly selected from a set of coding bases, and with a polarity relative to the coding base that depends on the value of the corresponding message bit. Supervisory pulses are encoded using a coding base different from the coding bases in the aforementioned set. The encoded pulses are sent to a recipient over a quantum channel. The transmitter also informs the recipient of the positions of the supervisory pulses. The recipient detects the pulses relative to a locally selected coding base, producing a zero-click, a one-click or a two-click. By measuring the received proportion of zero-clicks, one-clicks and two-clicks, for both message pulses and supervisory pulses, and by verifying whether these detection statistics obey certain expected relationships, the recipient can determine whether an attack is taking place on the quantum channel.
    • 发射机将量子脉冲分为监控脉冲和消息脉冲,并将每个消息脉冲分配给消息位。 然后使用从一组编码基地随机选择的编码基,并且相对于依赖于相应消息比特的值的编码基极性的极性来对每个消息脉冲进行编码。 使用与上述集合中的编码基不同的编码基来对监视脉冲进行编码。 编码的脉冲通过量子通道发送到接收器。 发射机还通知接收者监控脉冲的位置。 收件人检测相对于本地选择的编码基地的脉冲,产生零点击,一键或双击。 通过测量接收到的两个消息脉冲和监控脉冲的零点击,一次点击和两次点击的比例,并且通过验证这些检测统计信息是否服从某些预期关系,接收者可以确定是否发生攻击 量子通道。